Goodreads helps you keep track of books you want to read.
Start by marking “Computer Security Fundamentals” as Want to Read:
Computer Security Fundamentals
Enlarge cover
Rate this book
Clear rating
Open Preview

Computer Security Fundamentals

liked it 3.0  ·  Rating Details ·  10 Ratings  ·  2 Reviews
KEY BENEFIT This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas includi ...more
Paperback, First Edition, 344 pages
Published March 1st 2005 by Prentice Hall (first published 2005)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Computer Security Fundamentals, please sign up.

Be the first to ask a question about Computer Security Fundamentals

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-25 of 25)
filter  |  sort: default (?)  |  Rating Details
Rachel Bayles
Jun 13, 2016 Rachel Bayles rated it liked it
Shelves: professional
Very basic text for non-IT types to get an idea what goes on underneath the hood. At the very least, will frighten you into doing regular backups.
Wayne McCoy
Mar 13, 2013 Wayne McCoy rated it liked it
A solid introduction to computer security basics covering topics ranging from hackers and frauds to security policies and computer forensics. This book is by no means comprehensive, but provides lots of very useful information to anyone looking for a start in computer security.

Each chapter ends with a series of self tests and exercises built to give the user further knowledge, and the book is full of links for further study and information. There are plenty of real world examples and best practi
...more
KyLe
KyLe marked it as to-read
Mar 23, 2016
Faisal
Faisal rated it liked it
Feb 22, 2016
Ezekiel Jere
Ezekiel Jere rated it it was amazing
Oct 13, 2015
Vatterott College
Vatterott College marked it as to-read
Jun 02, 2015
Greg
Greg rated it it was ok
Apr 23, 2015
Nighama
Nighama marked it as to-read
Feb 07, 2015
Ben
Ben added it
Jun 16, 2014
Ttp
Ttp rated it did not like it
Mar 21, 2014
Justin Scott
Justin Scott rated it liked it
Jan 11, 2014
Dave
Dave rated it really liked it
Nov 28, 2013
Troyus23
Troyus23 marked it as to-read
Nov 19, 2013
Ahmad Albab
Ahmad Albab marked it as to-read
Oct 09, 2013
As
As marked it as to-read
Aug 17, 2013
Ahmed Afifi
Ahmed Afifi is currently reading it
Apr 21, 2013
Jennifer
Jennifer marked it as to-read
Mar 03, 2013
Sean Barlow
Sean Barlow rated it liked it
Sep 26, 2012
Areej M.
Areej M. marked it as to-read
Jun 04, 2012
Franck
Franck added it
Oct 20, 2010
Chieh-Wen Yang
Chieh-Wen Yang rated it liked it
Jun 03, 2010
There are no discussion topics on this book yet. Be the first to start one »
135366
Chuck Easttom is an internationally renowned computer security expert and trainer. He has been in the IT industry for over 18 years and training for over 10. He has conducted numerous computer security courses over the past decade, most notably for the Secret Service Electronic Crimes Task Force. Students in his classes often include network administrators, corporate chief security officers (CSO’s ...more
More about Chuck Easttom...

Share This Book



“Some viruses don’t actually harm the system itself, but all of them cause network slowdowns due to the heavy network traffic caused by the virus replication” 2 likes
More quotes…